H4x0r.DZ๐Ÿ‡ฉ๐Ÿ‡ฟ(@h4x0r_dz) 's Twitter Profile Photo

My name is 'Guggenheim Partners' and I'm a 'global investment and advisory financial services firm' also I manage 'More than $320ย billion in assets'

I want hackers to secure my systems for free ๐Ÿฅฐ hackers are so kind and they have nothing to do in their lives

My name is 'Guggenheim Partners' and I'm a 'global investment and advisory financial services firm' also I manage 'More than $320ย billion in assets'

I want hackers to secure my systems for free ๐Ÿฅฐ hackers are so kind and they have nothing to do in their lives
#VDP #BugBounty
account_circle
Zayed ๐Ÿ‡ต๐Ÿ‡ธ(@D0L0RESH4Z3) 's Twitter Profile Photo

sometimes if u trying to access an endpoint and get 403
try this
/api/docs/index.html ==> 403 Forbidden
/api/Docs/index.html ==> 200 Ok

I think it's called 'Case Insensitivity Vulnerability'

tips

sometimes if u trying to access an endpoint and get 403 
try this
/api/docs/index.html ==> 403 Forbidden
/api/Docs/index.html ==> 200 Ok

I think it's called 'Case Insensitivity Vulnerability'

#bugbountytips  #bugbounty #cybersecurity #Pentesting
account_circle
Cybertix(@thecybertix) 's Twitter Profile Photo

Time based SQL Injection using waybackurls

waybackurls TARGET.COM | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt

continuing oneliner in another Thread๐Ÿ‘‡

tips

Time based SQL Injection using waybackurls

waybackurls TARGET.COM | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt 

continuing oneliner in another Thread๐Ÿ‘‡

#bugbountytips #bugbounty #ai
account_circle
Gudetama(@gudetama_bf) 's Twitter Profile Photo

XSS Hunting from WaybackURLS

waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls-xss.txt | sort -u -o urls-xss.txt && cat urls-xss.txt | kxss

tips

XSS Hunting from WaybackURLS

waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls-xss.txt | sort -u -o urls-xss.txt && cat urls-xss.txt | kxss

#bugbountytips #bugbounty
account_circle
Shreyas Chavhan(@shreyas_chavhan) 's Twitter Profile Photo

Sharing My Study Methodology as a Bug Bounty Hunter. I promised a friend of mine that I'll share my study methodology with them - thought if I'm gonna share it with them, why not make it public ๐Ÿคท๐Ÿปโ€โ™‚๏ธ.

Link ๐Ÿ”—: shreyaschavhan.notion.site/My-Study-Methoโ€ฆ

Sharing My Study Methodology as a Bug Bounty Hunter. I promised a friend of mine that I'll share my study methodology with them - thought if I'm gonna share it with them, why not make it public ๐Ÿคท๐Ÿปโ€โ™‚๏ธ.

Link ๐Ÿ”—: shreyaschavhan.notion.site/My-Study-Methoโ€ฆ

#BugBounty #bugbountytips #study
account_circle
Shivam Kumar Singh(@MrRajputHacker) 's Twitter Profile Photo

๐Ÿฅธ ๐™๐™š๐™ก๐™š๐™œ๐™ง๐™–๐™ข ๐™๐˜พ๐™€ ๐™‹๐™Š๐˜พ - Fixed

A recent Telegram RCE bug has been fixed, but attackers are still trying to bypass the fix.

โš ๏ธ ๐™’๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ: If you receive a picture or video, DO NOT click or download it! It may contain malware.

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

SQL Injection to Account Takeover Manually :)
1. Enter mobile number to login intercept
{'mobile_number':'8888888888'} >> 200
{'mobile_number':'8888888888''} >> 500
{'mobile_number':'8888888888'''} >> 200

credit: BBR - Bug Bounty Resources ๐Ÿงต

tips

SQL Injection to Account Takeover Manually :) 
1. Enter mobile number to login intercept
{'mobile_number':'8888888888'} >> 200
{'mobile_number':'8888888888''} >> 500
{'mobile_number':'8888888888'''} >> 200

credit: @bbr_bug 

#bugbountytips #bugbounty
account_circle
Bzzzzzzzzzz(@Xtytia0922) 's Twitter Profile Photo

First day on a new private program and a very interesting account takeover. This may be a duplicate, but let's hope and see the first reply!๐Ÿ™

Read comments for a full bug description and how the takeover was madeโคต๏ธ

First day on a new private program and a very interesting account takeover. This may be a duplicate, but let's hope and see the first reply!๐Ÿ™ 

Read comments for a full bug description and how the takeover was madeโคต๏ธ

#BugBounty #bugbountytips
account_circle